Our concept
Train a variety of profiles, combine attractive and fun courses with rigor and excellence, we can do it!




As a citizen and cybersecurity professional, I developed the conviction that education is the key to meeting the challenges posed by the ecological and digital transitions, which are converging and profoundly transforming the world we are living in. No ecological transition without digital transition, no digital transition without cybersecurity.
The entire CSB team shares this conviction and puts its enthusiasm and passion at the service of a strong ambition: to nurture cybersecurity talents who contribute today and tomorrow to a fairer, safer, more responsible world.
This ambition is reflected in our commitment to make cybersecurity accessible for the greater good and to support all players in the sector, through our hybrid training courses developed by cybersecurity and education professionals.
We are driven daily by the pleasure of transmitting and learning, standing by your side.

Jobs matching
With us, companies are waiting for you! "Job matching" sessions are organized so you can find your job with one of our partners.
No more grades
Effective work is collaborative work rather than a race to the top. Here, no grades, the training modules are or are not validated, which cannot be attained through an average of grades.
A la carte
Why attend a class, if you already master its content? Further to a skills assessment, you choose your specialisation, and we adapt your training course. Optimization and efficiency!
Free of charge
No student loans or debt, your tuition fees are 100% supported by your sponsor company. You will even get paid! High motivation and a smiling face is all you need.


An “à la carte” training model to develop unique expertise
You are unique, so should be your training program. In consultation with our academic department, and aligned with your know-how and your specialisation, we define the training modules strictly necessary for a smooth training program. A skills assessment is carried out as soon as you enter our program, to determine the knowledge already mastered, and thus adapt your training course. One item remains common to all students i.e. to pass the cybersecurity professional certifications that are compulsory as part of their training program.
Quality requirements for teachers
All of our speakers are working professionals. We guarantee the quality of each of our training courses by controlling our editorial line end-to-end. As cybersecurity continually evolves, our programs are updated annually and completely redesigned every 3 years; the responsibility to ensure this rule is respected lies with our Academic Dean. Our speakers are all driven by the same passion for their field of expertise and the desire to pass on their knowledge. In their eyes, you are not only students but also future peers and colleagues.


Hybrid learning at the service of cybersecurity
Our education model
Modularity and practice are the two pillars of our education model. Practice is carried out in our rooms dedicated to simulation exercises replicating information and industrial systems environments. This notably allows free reproduction of cybersecurity incidents and attacks.
What is a BTU?
The Blended Training Units ensure the modularity of our training courses. A BTU is made up of a set of face-to-face, remote and e-Learning training courses, each representing 20-hour investment time for our learners. It makes it possible to optimize the best of each type of teaching.
specialisations
Information Technology (IT) - Operational Technology (OT) and Management of Cybersecurity Operations (SOC)
skills sets
represent the knowledge to be acquired to become an expert in one of our training courses
BTU
available and selected by us based on the skills you must acquire
know-how
represent what you have acquired at the end of your training program
Our academic programs
We care about providing you with the proper training for your future job. We offer 3 different specialisations to meet that goal. Our programs allow training for multiple jobs, whether technical or management-oriented.
5-year program
Are you looking forward to long studies? Is your job goal to quickly lead multidisciplinary teams?
Or do you enjoy life on our campus so much that you want to stay forever?
The 5-year program is made for you.
Bachelor program
The perfect program for technical expert professions in cybersecurity. Select your specialisation (IT - IT or Industrial - OT) and off you go! Gateways exist for those who already validated training courses connected to the cyber field, such as IT or wrongly considered as being "remote" from the cyber field - law degree, business administration…
Master program
Our Master program is adapted to professions with supervising responsibilities and addresses specific cybersecurity requirements. It allows you to deepen and refine your knowledge and skills in one of our 3 specialisations: Information Technology (IT), Industrial (OT) or Management of Cybersecurity Operations (SOC).
What if we go further?
Let's try to answer the most frequently asked questions.
Are your training courses accessible to all types of audience?
Whether you are a student or a professional in retraining, holding a high school degree, are literature or science-oriented, our courses are designed for all types of profiles. Refreshers are delivered, and all of our courses are available at any time through e-learning. If in doubt, you are welcome to come in and discuss with any of our school team members.
Are all the training modules science and technology-oriented?
Whoever says cyber necessarily says science, math and technology. And who says cyber, also says management, crisis communication, team management and many others. You necessarily have skills that are essential for cybersecurity. Don't underestimate your abilities, you are legitimate! And we're here to help.
The work-study program from year 1, why?
Cyber is about three things: practice, practice and more practice. You can learn theoretical basics, but for these to be efficient, you must enter the job market early on. Taking a job at a company is essential to start practising your skills on the ground.
Are the certification costs borne by the learners?
Our 5-year program prepares our learners to pass seven of the most internationally recognized certifications in cybersecurity, namely: CEH, CISM, CISA, CIRSC, CISSP, ISO 27001 LA, GICSP. Two are mandatory as part of your studies: CEH and CISSP. Your sponsor company pays for your tuition fees, which include the costs to take these two certifications. You are free to take the other five certifications at your own expense.
Companies, partners, teammates to support you
Companies/organizations share our values and demonstrate it by committing to support our teaching model. Our learners have the opportunity to train and work alongside them. They share our conviction that education plays a crucial role in meeting the challenges of cyber. We will soon be able to share this list of partners with you! Stay tuned!






How to apply?
Rule #1: Don't prep. We would say to you “just do it”, but this slogan is already taken. Our school first highlights “soft skills”, a major asset in the cybersecurity field. Of course, a skills assessment is necessary to assess your maturity in this area. We carry it out together during an interview.
Submit your application file:
Go to the "Admission" tab and send us your cover letter and your CV.
Interview:
Once your application file has been reviewed, you are interviewed. The interview can be conducted by videoconference.
Welcome:
If you are still eager to join, we agree on the mutual terms of a learner/school charter and you officially enter our program. Next step: job matching session.


Look up for the job that suits you
Because we don't always know what to do or how to do it. Because we have the right to change our minds or just “because”. Here is the list of cybersecurity jobs tackled by the CSB School. Of course, it's a non-exhaustive list! Many of the jobs you'll do tomorrow do not exist today.
